NETGEAR ProSafe FVS318N Reference Manual page 223

Wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for ProSafe FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Table 51. Add IKE Policy screen settings (continued)
Setting
Description
Authentication Method Select one of the following radio buttons to specify the authentication method:
• Pre-shared key. A secret that is shared between the wireless VPN firewall and
• RSA-Signature. Uses the active self-signed certificate that you uploaded on the
Pre-shared key
Diffie-Hellman (DH)
The DH Group sets the strength of the algorithm in bits. The higher the group, the
Group
more secure the exchange. From the drop-down list, select one of the following
three strengths:
• Group 1 (768 bit).
• Group 2 (1024 bit). This is the default setting.
• Group 5 (1536 bit).
Note:
SA-Lifetime (sec)
The period in seconds for which the IKE SA is valid. When the period times out,
the next rekeying occurs. The default is 28800 seconds (8 hours).
Enable Dead Peer
Select a radio button to specify whether or not Dead Peer Detection (DPD) is
Detection
enabled:
• Yes. This feature is enabled. When the wireless VPN firewall detects an IKE
Note:
See also
Configure Keep-Alives
and Dead Peer
Detection
on
• No. This feature is disabled. This is the default setting.
page 253.
Detection Period
Reconnect after
failure count
Virtual Private Networking Using IPSec and L2TP Connections
the remote endpoint.
Certificates screen (see
Manage VPN Self-Signed Certificates
The pre-shared key is masked out when you select RSA-Signature.
A key with a minimum length of 8 characters and no more
than 49 characters. Do not use a double quote (''), single
quote('), or space in the key.
Ensure that the DH Group is configured identically on both sides.
connection failure, it deletes the IPSec and IKE SA and forces a reestablishment
of the connection. You need to specify the detection period in the Detection
Period field and the maximum number of times that the wireless VPN firewall
attempts to reconnect in the Reconnect after failure count field.
The period in seconds between consecutive
DPD R-U-THERE messages, which are sent only when the
IPSec traffic is idle.
The maximum number of DPD failures before the wireless
VPN firewall tears down the connection and then attempts to
reconnect to the peer. The default is 3 failures.
223
on page 309).

Advertisement

Table of Contents
loading

Table of Contents